期刊文献+
共找到40,759篇文章
< 1 2 250 >
每页显示 20 50 100
完全掌握你的系统资源——Windows System Resource Manager
1
作者 魏强 《Windows & Net Magazine(国际中文版)》 2003年第09M期68-72,共5页
关键词 系统资源 系统资源管理器 WSRM windows 资源分配策略
下载PDF
WindowsXP与Microsoft其他OperatingSystem的功能对比
2
作者 曹伟平 董大钧 杨德华 《沈阳医学院学报》 2002年第2期112-113,共2页
关键词 windows操作系统 多媒体功能 网络功能 操作系统
下载PDF
Windows Media和RealSystem中组播流的实现及其比较
3
作者 蒋文娟 卢朝晖 《贵州科学》 2005年第1期26-29,共4页
组播是一种可以充分节省带宽的数据传输方式,而流媒体是目前Internet上使用了流式传输技术的媒体文件。本文主要讨论了如何在Windows Media和RealSystem中用组播方式来传输流媒体信息,并在文章最后进行了比较和总结。
关键词 windows REALsystem Media 组播 Internet 数据传输方式 流式传输技术 媒体文件 媒体信息 流媒体 传输流 带宽
下载PDF
Windows 3.1的SYSTEM.INI和CONTROL.INI文件设置
4
作者 陆黎明 《电脑技术——Hello-IT》 1996年第10期22-23,共2页
关键词 windows system.INI CONTROL.INI 文件设置
下载PDF
计算机应用基础Windows XP/Office System平台复习指南
5
作者 刘小星 《当代电大》 2004年第11期40-46,共7页
关键词 计算机应用 windows XP Office system 操作系统 文字处理系统 办公自动化 广播电视教育 复习指南
下载PDF
通过交叉验证堆栈和VAD信息检测Windows代码注入
6
作者 翟继强 韩旭 +2 位作者 王家乾 孙海旭 杨海陆 《哈尔滨理工大学学报》 CAS 北大核心 2024年第2期43-51,共9页
Windows 32/64位代码注入攻击是恶意软件常用的攻击技术,在内存取证领域,现存的代码注入攻击检测技术在验证完整性方面不能处理动态内容,并且在解析内存中数据结构方面无法兼容不同版本的Windows系统。因此提出了通过交叉验证进程堆栈和... Windows 32/64位代码注入攻击是恶意软件常用的攻击技术,在内存取证领域,现存的代码注入攻击检测技术在验证完整性方面不能处理动态内容,并且在解析内存中数据结构方面无法兼容不同版本的Windows系统。因此提出了通过交叉验证进程堆栈和VAD信息定位注入代码方法,将基于遍历栈帧得到的函数返回地址、模块名等信息结合进程VAD结构来检测函数返回地址、匹配文件名以定位注入代码,并且研发了基于Volatility取证框架的Windows代码注入攻击检测插件codefind。测试结果表明,即使在VAD节点被恶意软件修改,方法仍能够有效定位Windows 32/64位注入代码攻击。 展开更多
关键词 VAD 堆栈 windows代码注入 内存取证技术
下载PDF
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
7
作者 Islam Zada Mohammed Naif Alatawi +4 位作者 Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2917-2939,共23页
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar... Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats. 展开更多
关键词 Security and privacy challenges in the context of requirements engineering supervisedmachine learning malware detection windows systems comparative analysis Gaussian Naive Bayes K Nearest Neighbors Stochastic Gradient Descent Classifier Decision Tree
下载PDF
Multi-type ant system algorithm for the time dependent vehicle routing problem with time windows 被引量:14
8
作者 DENG Ye ZHU Wanhong +1 位作者 LI Hongwei ZHENG Yonghui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期625-638,共14页
The time dependent vehicle routing problem with time windows(TDVRPTW) is considered. A multi-type ant system(MTAS) algorithm hybridized with the ant colony system(ACS)and the max-min ant system(MMAS) algorithm... The time dependent vehicle routing problem with time windows(TDVRPTW) is considered. A multi-type ant system(MTAS) algorithm hybridized with the ant colony system(ACS)and the max-min ant system(MMAS) algorithms is proposed. This combination absorbs the merits of the two algorithms in solutions construction and optimization separately. In order to improve the efficiency of the insertion procedure, a nearest neighbor selection(NNS) mechanism, an insertion local search procedure and a local optimization procedure are specified in detail. And in order to find a balance between good scouting performance and fast convergence rate, an adaptive pheromone updating strategy is proposed in the MTAS. Computational results confirm the MTAS algorithm's good performance with all these strategies on classic vehicle routing problem with time windows(VRPTW) benchmark instances and the TDVRPTW instances, and some better results especially for the number of vehicles and travel times of the best solutions are obtained in comparison with the previous research. 展开更多
关键词 multi-type ant system(MTAS) time dependent vehicle routing problem with time windows(VRPTW) nearest neighbor selection(NNS)
下载PDF
Building Hot Snapshot Copy Based on Windows File System 被引量:4
9
作者 WANG Lina GUO Chi WANG Dejun ZHU Qin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1503-1506,共4页
This paper describes a method for building hot snapshot copy based on windows-file system (HSCF). The architecture and running mechanism of HSCF are discussed after giving a comparison with other on-line backup tecb... This paper describes a method for building hot snapshot copy based on windows-file system (HSCF). The architecture and running mechanism of HSCF are discussed after giving a comparison with other on-line backup tecbnology. HSCF, based on a file system filter driver, protects computer data and ensures their integrity and consistency with following three steps: access to open files, synchronization and copy on-write. Its strategies for improving system performance are analyzed including priority setting, incremental snapshot and load balance. HSCF is a new kind of snapshot technology to solve the data integrity and consistency problem in online backup, which is different from other storage-level snapshot and Open File Solution. 展开更多
关键词 SNAPSHOT backup and recovery windows file system filter driver data integrity and consistency
下载PDF
The research of optical windows used in aircraft sensor systems 被引量:2
10
作者 周峰 李岩 汤天瑾 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期183-187,共5页
The optical windows used in aircrafts protect their imaging sensors from environmental effects. Considering the imaging performance, flat surfaces are traditionally used in the design of optical windows. For aircrafts... The optical windows used in aircrafts protect their imaging sensors from environmental effects. Considering the imaging performance, flat surfaces are traditionally used in the design of optical windows. For aircrafts operating at high speeds, the optical windows should be relatively aerodynamic, but a flat optical window may introduce unacceptably high drag to the airframes. The linear scanning infrared sensors used in aircrafts with, respectively, a flat window, a spherical window and a toric window in front of the aircraft sensors are designed and compared. Simulation results show that the optical design using a toric surface has the integrated advantages of field of regard, aerodynamic drag, narcissus effect, and imaging performance, so the optical window with a toric surface is demonstrated to be suited for this application. 展开更多
关键词 optical window aircraft sensor narcissus effect toric surface
下载PDF
PERIODIC WINDOWS OF NONLINEAR GEAR SYSTEM BASED ON SYMBOLIC DYNAMICS 被引量:6
11
作者 GAO Zhiying SHEN Yunwen LIU Xiaoning 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2006年第3期434-438,共5页
The periodic window is researched by means of the symbolic dynamics and formal language. Firstly, the proper sampling period is taken and the orbital points of periodic motion are obtained through Poincar6 mapping. Se... The periodic window is researched by means of the symbolic dynamics and formal language. Firstly, the proper sampling period is taken and the orbital points of periodic motion are obtained through Poincar6 mapping. Secondly, according to the method of symbolic dynamics of one-dimensional discrete mapping, the symbolic sequence describing the periodic orbit is obtained. Finally, based on the symbolic sequence, the corresponding model of minimal finite automation is constructed and the entropy is obtained by calculating the maximal eigenvalue of Stefan matrix. The results show that the orbits in periodic windows can be strictly marked by using the method of symbolic dynamics, thus a foundation for control of switching between target orbits is provided. 展开更多
关键词 Nonlinear gear system Periodic window Symbolic sequence Finite automation Entropy
下载PDF
Influence of Three Sizes of Sliding Windows on Principle Component Analysis Fault Detection of Air Conditioning Systems 被引量:1
12
作者 YANG Xuebin MA Yanyun +2 位作者 HE Ruru WANG Ji LUO Wenjun 《Journal of Donghua University(English Edition)》 CAS 2022年第1期72-78,共7页
Principal component analysis(PCA)has been already employed for fault detection of air conditioning systems.The sliding window,which is composed of some parameters satisfying with thermal load balance,can select the ta... Principal component analysis(PCA)has been already employed for fault detection of air conditioning systems.The sliding window,which is composed of some parameters satisfying with thermal load balance,can select the target historical fault-free reference data as the template which is similar to the current snapshot data.The size of sliding window is usually given according to empirical values,while the influence of different sizes of sliding windows on fault detection of an air conditioning system is not further studied.The air conditioning system is a dynamic response process,and the operating parameters change with the change of the load,while the response of the controller is delayed.In a variable air volume(VAV)air conditioning system controlled by the total air volume method,in order to ensure sufficient response time,30 data points are selected first,and then their multiples are selected.Three different sizes of sliding windows with 30,60 and 90 data points are applied to compare the fault detection effect in this paper.The results show that if the size of the sliding window is 60 data points,the average fault-free detection ratio is 80.17%in fault-free testing days,and the average fault detection ratio is 88.47%in faulty testing days. 展开更多
关键词 sliding window principal component analysis(PCA) fault detection sensitivity analysis air conditioning system
下载PDF
Windows and Fieldbus Based Software Computer Numerical Control System
13
作者 WU Hongen~(1,2) ZHANG Chengrui~1 LI Guili~2 WANG Baoren~(1,2) (1.Mechanical School,Shandong University,Jinan 250061,China, 2.College of Mechanical and Electronic Engineering,Shandong University of Sci & Tech,Qingdao 266510,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S3期1148-1152,共5页
Computer numerical control(CNC)system is the base of modern digital and intelligent manufacturing technolo- gy.And opened its architecture and constituted based on PC and Windows operating system(OS)is the main trend ... Computer numerical control(CNC)system is the base of modern digital and intelligent manufacturing technolo- gy.And opened its architecture and constituted based on PC and Windows operating system(OS)is the main trend of CNC sys- tem.However,even if the highest system priority is used in user mode,real-time capability of Windows(2000,NT,XP)for applications is not guaranteed.By using a device driver,which is running in kernel mode,the real time performance of Windows can be enhanced greatly.The acknowledgment performance of Windows to peripheral interrupts was evaluated.Harmonized with an intelligent real-time serial communication bus(RTSB),strict real-time performance can be achieved in Windows platform. An opened architecture software CNC system which is hardware independence is proposed based on PC and RTSB.A numerical control real time kernel(NCRTK),which is implemented as a device driver on Windows,is used to perform the NC tasks.Tasks are divided into real-time and non real-time.Real-time task is running in kernel mode and non real-time task is running in user mode.Data are exchanged between kernel and user mode by DMA and Windows Messages. 展开更多
关键词 SOFTWARE CNC windows operating system REAL-TIME kernel REAL-TIME SERIAL communication BUS
下载PDF
Bimetallic In_(2)O_(3)/Bi_(2)O_(3) Catalysts Enable Highly Selective CO_(2) Electroreduction to Formate within Ultra-Broad Potential Windows 被引量:1
14
作者 Zhongxue Yang Hongzhi Wang +7 位作者 Xinze Bi Xiaojie Tan Yuezhu Zhao Wenhang Wang Yecheng Zou Huai ping Wang Hui Ning Mingbo Wu 《Energy & Environmental Materials》 SCIE EI CAS CSCD 2024年第1期257-264,共8页
CO_(2)electrochemical reduction reaction(CO_(2)RR)to formate is a hopeful pathway for reducing CO_(2)and producing high-value chemicals,which needs highly selective catalysts with ultra-broad potential windows to meet... CO_(2)electrochemical reduction reaction(CO_(2)RR)to formate is a hopeful pathway for reducing CO_(2)and producing high-value chemicals,which needs highly selective catalysts with ultra-broad potential windows to meet the industrial demands.Herein,the nanorod-like bimetallic ln_(2)O_(3)/Bi_(2)O_(3)catalysts were successfully synthesized by pyrolysis of bimetallic InBi-MOF precursors.The abundant oxygen vacancies generated from the lattice mismatch of Bi_(2)O_(3)and ln_(2)O_(3)reduced the activation energy of CO_(2)to*CO_(2)·^(-)and improved the selectivity of*CO_(2)·^(-)to formate simultaneously.Meanwhile,the carbon skeleton derived from the pyrolysis of organic framework of InBi-MOF provided a conductive network to accelerate the electrons transmission.The catalyst exhibited an ultra-broad applied potential window of 1200 mV(from-0.4 to-1.6 V vs RHE),relativistic high Faradaic efficiency of formate(99.92%)and satisfactory stability after 30 h.The in situ FT-IR experiment and DFT calculation verified that the abundant oxygen vacancies on the surface of catalysts can easily absorb CO_(2)molecules,and oxygen vacancy path is dominant pathway.This work provides a convenient method to construct high-performance bimetallic catalysts for the industrial application of CO_(2)RR. 展开更多
关键词 bimetallic catalyst CO_(2)electrochemical reduction reaction FORMATE oxygen vacancy wide potential window
下载PDF
A NOVEL TRACKING ALGORITHM BASED ON GRAVITY OF ENERGY WINDOWS FOR DS/CDMA SYSTEM
15
作者 Guo Jinghong You Xiaohu Cheng Shixin (National Mobile Communication Research Laboratory, Southeast University, Nanjing 210018) 《Journal of Electronics(China)》 2000年第4期313-318,共6页
PN (Pseudo-Noise) code tracking is the most challenging task in a Direct Sequence Spread Code Division Multiplex Access (DS-CDMA) for celluar mobile communication systems. In this paper, the gravity of energy windows ... PN (Pseudo-Noise) code tracking is the most challenging task in a Direct Sequence Spread Code Division Multiplex Access (DS-CDMA) for celluar mobile communication systems. In this paper, the gravity of energy windows (GEW) tracking loop of the time and frequency uncertainty of the received signal is investigated, and the GEW’s analytical results in a multi-path fading channel are introduced. GEW tracking loop exploits the inherent multi-path diversity of the channel, and has better performance than single-path one when working in multi-path fading environment. 展开更多
关键词 PN TRACKING DS/CDMA ENERGY WINDOW
下载PDF
Left-Handedness with Three Zero-Absorption Windows Tuned by the Incoherent Pumping Field and Inter-Dot Tunnelings in a GaAs/AlGaAs Triple Quantum Dots System
16
作者 赵顺才 张双颖 +1 位作者 吴奇宣 贾靖 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第5期157-160,共4页
Left-handedness with three zero-absorption windows is achieved in a triple-quantum-dot system. With the typ- ical parameters of a GaAs/AlGaAs heterostructure, the simultaneous negative relative electric permittivity a... Left-handedness with three zero-absorption windows is achieved in a triple-quantum-dot system. With the typ- ical parameters of a GaAs/AlGaAs heterostructure, the simultaneous negative relative electric permittivity and magnetic permeability are obtained by the adjustable incoherent pumping field and two inter-dot tunnelings. Furthermore, three zero-absorption windows in the left-handedness frequency bands are observed. The left- handedness with zero-absorption in the solid state heterostrueture may solve the challenges not only in the left-handed materials achieved by the photonic resonant scheme but also in the application of negative refractive materials with a large amount of absorption. 展开更多
关键词 In Left-Handedness with Three Zero-Absorption windows Tuned by the Incoherent Pumping Field and Inter-Dot Tunnelings in a GaAs/AlGaAs Triple Quantum Dots system
下载PDF
基于Windows Server Failover Cluster的Apache故障转移集群应用实践
17
作者 李应晓 矫健 +2 位作者 宋庆章 吴连强 徐庶 《长江信息通信》 2024年第10期166-168,共3页
在当前互联网时代,Web应用程序的高可用性和可靠性是确保业务持续运行的关键因素。针对Apache Web服务器,介绍了利用Windows Server 2019 Failover Cluster构建Apache故障转移集群的实践方案。通过配置两个节点的故障转移集群,当某个节... 在当前互联网时代,Web应用程序的高可用性和可靠性是确保业务持续运行的关键因素。针对Apache Web服务器,介绍了利用Windows Server 2019 Failover Cluster构建Apache故障转移集群的实践方案。通过配置两个节点的故障转移集群,当某个节点发生故障时,Apache服务将自动在另一个节点上重新启动,从而最大程度地减少系统中断的时间,提高Web应用的可用性。详细阐述了集群搭建的具体步骤、配置要点、集群验证方法以及运行时的监控与维护方法,为构建高可用Apache Web服务器提供一种实用的解决方案。 展开更多
关键词 windows Server 2019 Failover Cluster APACHE 故障转移 集群
下载PDF
Microsoft Systems Management Server(SMS)OS Deployment Feature Pack使用的Windows Image(WIM)格式是Windows Vista要使用的最终版本吗?
18
《Windows IT Pro Magazine(国际中文版)》 2008年第9期80-80,共1页
不是的。SMS OS Deployment Feature Pack使用的WIM格式可以认为是WIM格式的0.9版,这种格式的1.0版随着Vista一起发布。SMS 4.0(现在称之为SCCM2007)完全支持Vista WIM(1.0)格式,
关键词 VISTA windows Microsoft PACK systems 版本 SMS WIM
下载PDF
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
19
作者 Juhwan Kim Baehoon Son +1 位作者 Jihyeon Yu Joobeom Yun 《Computers, Materials & Continua》 SCIE EI 2024年第11期3371-3393,共23页
Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the comp... Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies. 展开更多
关键词 Digital forensics autoencoder logarithmic entropy PRIORITIZATION anomaly detection windows artifacts artificial intelligence
下载PDF
软件巨人微软全球同期发布历史上最重要的产品——2007 Microsoft Office system、Windows Vista和Exchange Server 2007三大商务引擎
20
作者 康荣 《通信世界》 2006年第48B期25-25,共1页
关键词 EXCHANGE windows Office 微软公司 VISTA 引擎 商务 产品
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部